
Understanding and Applying Threat Intelligence
07/07/20 • 40 min
Click here to send us your ideas and feedback on Blueprint!
Katie Nickels talks about what threat intelligence is, where to get it, what you should expect from it, and how the SOC should be using it.
Twitter Handles: @likethecoins | @SecHubb | @SANSDefense
All Blueprint Podcast Episodes: sans.org/blueprint-podcast
PRE-ROLL only! It says lets jump in at the end.
Check out John's SOC Training Courses for SOC Analysts and Leaders:
- SEC450: Blue Team Fundamentals - Security Operations and Analysis
- LDR551: Building and Leader Security Operations Centers
Follow and Connect with John: LinkedIn
Click here to send us your ideas and feedback on Blueprint!
Katie Nickels talks about what threat intelligence is, where to get it, what you should expect from it, and how the SOC should be using it.
Twitter Handles: @likethecoins | @SecHubb | @SANSDefense
All Blueprint Podcast Episodes: sans.org/blueprint-podcast
PRE-ROLL only! It says lets jump in at the end.
Check out John's SOC Training Courses for SOC Analysts and Leaders:
- SEC450: Blue Team Fundamentals - Security Operations and Analysis
- LDR551: Building and Leader Security Operations Centers
Follow and Connect with John: LinkedIn
Previous Episode

Privacy Laws: The Future Driver of Cyber Security
Click here to send us your ideas and feedback on Blueprint!
Mary Chaney shares what types of laws we should be concerned about. She discusses her thoughts on privacy laws and how that will drive cyber security, and what she’s doing to get more diverse representation in the industry at all levels.
Twitter Handles: @MaryNChaney | @SecHubb | @SANSDefense
All Blueprint Podcast Episodes: sans.org/blueprint-podcast
PRE-ROLL only! It says lets jump in at the end.
Check out John's SOC Training Courses for SOC Analysts and Leaders:
- SEC450: Blue Team Fundamentals - Security Operations and Analysis
- LDR551: Building and Leader Security Operations Centers
Follow and Connect with John: LinkedIn
Next Episode

Training Yourself in a Quarantined World
Click here to send us your ideas and feedback on Blueprint!
Dave and Ryan speak with John about resources for training yourself, and the challenges of setting up a large-scale cyber lab to simulate an advanced attack for their Splunk Boss of the SOC competition.
Twitter Handles: @daveherrald | @meansec | @SecHubb | @SANSDefense
All Blueprint Podcast Episodes: sans.org/blueprint-podcast
PRE-ROLL only! It says lets jump in at the end.
Check out John's SOC Training Courses for SOC Analysts and Leaders:
- SEC450: Blue Team Fundamentals - Security Operations and Analysis
- LDR551: Building and Leader Security Operations Centers
Follow and Connect with John: LinkedIn
If you like this episode you’ll love
Episode Comments
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/blueprint-build-the-best-in-cyber-defense-234200/understanding-and-applying-threat-intelligence-26251401"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to understanding and applying threat intelligence on goodpods" style="width: 225px" /> </a>
Copy